General
-
Target
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9
-
Size
685KB
-
Sample
230327-sa6ycsea23
-
MD5
a5cf88acab030eb4e8f2df5317d0dc1d
-
SHA1
d9c3db480350bea34c7538804cca1449abf193b7
-
SHA256
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9
-
SHA512
9ef971e6e3fd8647d0c9333eab1483bde51eb6821a0c91c0c310f0a1e1db19add061281f55c663a9312f655d494b573f2fc822c98c012c55973c728c084867cd
-
SSDEEP
12288:SMryy90AAJeB00t6ZykDzcUomnkVIErYNzTH/YOICkzBbNMExK44ztowhTo8KEd:0yQo1XkMlmbKYNzTgOIFRNMExKbBowhT
Static task
static1
Behavioral task
behavioral1
Sample
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
nice
193.233.20.33:4125
-
auth_value
a7371b75699e8bc7c51fb960e8ac9e81
Targets
-
-
Target
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9
-
Size
685KB
-
MD5
a5cf88acab030eb4e8f2df5317d0dc1d
-
SHA1
d9c3db480350bea34c7538804cca1449abf193b7
-
SHA256
f418f058b04604397e7e7ee35cc925fe24c150c7ebe395894644aef2377c96d9
-
SHA512
9ef971e6e3fd8647d0c9333eab1483bde51eb6821a0c91c0c310f0a1e1db19add061281f55c663a9312f655d494b573f2fc822c98c012c55973c728c084867cd
-
SSDEEP
12288:SMryy90AAJeB00t6ZykDzcUomnkVIErYNzTH/YOICkzBbNMExK44ztowhTo8KEd:0yQo1XkMlmbKYNzTgOIFRNMExKbBowhT
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-